A hybrid quantum key distribution protocol based on extended unitary operations and fountain codes
Lai, Hong; Xue, Liyin; Orgun, Mehmet; Xiao, Jinghua; Pieprzyk, Josef
2014-10-31 00:00:00
In 1984, Bennett and Brassard designed the first quantum key distribution protocol, whose security is based on quantum indeterminacy. Since then, there has been growing research activities, aiming in designing new, more efficient and secure key distribution protocols. The work presents a novel hybrid quantum key distribution protocol. The key distribution is derived from both quantum and classical data. This is why it is called hybrid. The protocol applies extended unitary operations derived from four basic unitary operations and distributed fountain codes. Compared to other protocols published so far, the new one is more secure (provides authentication of parties and detection of eavesdropping) and efficient. Moreover, our protocol still works over noisy and lossy channels.
http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.pngQuantum Information ProcessingSpringer Journalshttp://www.deepdyve.com/lp/springer-journals/a-hybrid-quantum-key-distribution-protocol-based-on-extended-unitary-mBVjZG2Wir

Abstract

In 1984, Bennett and Brassard designed the first quantum key distribution protocol, whose security is based on quantum indeterminacy. Since then, there has been growing research activities, aiming in designing new, more efficient and secure key distribution protocols. The work presents a novel hybrid quantum key distribution protocol. The key distribution is derived from both quantum and classical data. This is why it is called hybrid. The protocol applies extended unitary operations derived from four basic unitary operations and distributed fountain codes. Compared to other protocols published so far, the new one is more secure (provides authentication of parties and detection of eavesdropping) and efficient. Moreover, our protocol still works over noisy and lossy channels.